UAC Bypass via Registry Modification Detected
Process attempted to bypass User Account Control by modifying registry key HKCU\Software\Classes\ms-settings\shell\open\command. This key is used by the fodhelper.exe auto-elevate mechanism to execute arbitrary commands with elevated privileges without displaying a UAC prompt to the user. The payload executed by this technique downloaded a remote access tool.